[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection

T Wu, L Leng, MK Khan - Artificial Intelligence Review, 2023 - Springer
Direct usage of original biometric features/templates definitely leads to serious privacy
leakage. In biometric cryptosystems, a biometric key is generated and then strictly protected …

Security and privacy in biometrics: towards a holistic approach

P Campisi - Security and privacy in biometrics, 2013 - Springer
Security and privacy in biometric systems have been traditionally seen as two requirements
hindering each other. Only in the recent past researchers have started investigating it as a …

Alignment-free row-co-occurrence cancelable palmprint fuzzy vault

L Leng, ABJ Teoh - Pattern Recognition, 2015 - Elsevier
Texture coding approach of palmprint biometric enjoys several merits; however, palmprint
texture code suffers from alignment problem during matching, which hinders it from being …

[图书][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification

W Ponce-Hernandez, R Blanco-Gonzalo… - IEEE …, 2020 - ieeexplore.ieee.org
As a consequence of the wide deployment of biometrics-based recognition systems, there
are increasing concerns about the security of the sensitive information managed. Various …

Biometric template security: an overview

N Riaz, A Riaz, SA Khan - Sensor Review, 2018 - emerald.com
Purpose The security of the stored biometric template is itself a challenge. Feature
transformation techniques and biometric cryptosystems are used to address the concerns …